Rating Breakdown

SC Lab Reviews

Reviews from our expert team

Features:

Documentation:

Value for Money:

Performance:

Support:

Ease of Use:

3/5

Summary

Symantec's NS 7120 uses a similar-looking chassis to its firewall range, complete with the LCD control panel. This means it is the easiest device to initially configure, as you can set an IP address within minutes of turning it on.

The IP address applies to the management port, which leaves four Fast Ethernet ports for monitoring and one for sending TCP resets.

Once done, management is performed by Symantec's Java-based Network Security Console. It's friendly and easy to use, although the slightly inconsistent interface is a little confusing at first. The first screen shows the hardware devices on your network; you can configure the type of monitoring you want out of each one. Using port pairs, this means that the 7120 can have two in-line sensors or four passive sensors.

In-line sensors can actively block threats, while passive sensors just send reporting data back. There is a disparity of throughput between the two, however, because passive scanning can handle up to 200Mbps of throughput, while in-line connections can handle just 100Mbps.

Security settings are based on policies. The management console comes with several predefined ones, which can be applied to any network sensor with the click of a button. For multiple sensor installations, it provides a rapid way of distributing a policy.

There's also the option to manually create a custom policy. It's easy and you have the choice to block or record each threat you want to scan for. The threat signature database updates automatically, but you can also create your own custom threat signatures to prevent internal threats.

Get SC Media delivered to your inbox

Whitepaper of the Day

Newswire

Buzz

I would like to receive relevant information via email from Haymarket Media.

SC Media arms cybersecurity professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.